CVE-2024-48982

An issue was discovered in MBed OS 6.16.0. Its hci parsing software dynamically determines the length of certain hci packets by reading a byte from its header. This value is assumed to be greater than or equal to 3, but the software doesn't ensure that this is the case. Supplying a length less than 3 leads to a buffer overflow in a buffer that is allocated later. It is simultaneously possible to cause another integer overflow by supplying large length values because the provided length value is increased by a few bytes to account for additional information that is supposed to be stored there. This bug is trivial to exploit for a denial of service but is not certain to suffice to bring the system down and can generally not be exploited further because the exploitable buffer is dynamically allocated.
Configurations

Configuration 1 (hide)

cpe:2.3:o:arm:mbed:6.16.0:*:*:*:*:*:*:*

History

22 Nov 2024, 21:41

Type Values Removed Values Added
References () https://github.com/mbed-ce/mbed-os/blob/54e8693ef4ff7e025018094f290a1d5cf380941f/connectivity/FEATURE_BLE/libraries/cordio_stack/ble-host/sources/hci/dual_chip/hci_evt.c#L2748 - () https://github.com/mbed-ce/mbed-os/blob/54e8693ef4ff7e025018094f290a1d5cf380941f/connectivity/FEATURE_BLE/libraries/cordio_stack/ble-host/sources/hci/dual_chip/hci_evt.c#L2748 - Product
References () https://github.com/mbed-ce/mbed-os/pull/386 - () https://github.com/mbed-ce/mbed-os/pull/386 - Issue Tracking, Patch, Vendor Advisory
Summary
  • (es) Se descubrió un problema en MBed OS 6.16.0. Su software de análisis de hci determina dinámicamente la longitud de ciertos paquetes hci leyendo un byte de su encabezado. Se supone que este valor es mayor o igual a 3, pero el software no garantiza que este sea el caso. Proporcionar una longitud menor a 3 provoca un desbordamiento de búfer en un búfer que se asigna más tarde. Al mismo tiempo, es posible provocar otro desbordamiento de enteros proporcionando valores de longitud grandes porque el valor de longitud proporcionado se incrementa en unos pocos bytes para tener en cuenta la información adicional que se supone que debe almacenarse allí. Este error es trivial de explotar para una denegación de servicio, pero no es seguro que sea suficiente para hacer caer el sistema y, por lo general, no se puede explotar más porque el búfer explotable se asigna dinámicamente.
CPE cpe:2.3:o:arm:mbed:6.16.0:*:*:*:*:*:*:*
CWE CWE-120
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Arm mbed
Arm

20 Nov 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-20 21:15

Updated : 2024-11-25 21:15


NVD link : CVE-2024-48982

Mitre link : CVE-2024-48982

CVE.ORG link : CVE-2024-48982


JSON object : View

Products Affected

arm

  • mbed
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')